Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire network, powered by N2K.
Christopher Cleary (0:12)
Hey everybody. Dave here. I've talked about Deleteme before and I'm still using it because it still works. It's been a few months now and I'm just as impressed today as I was when I signed up. Deleteme keeps finding and removing my personal information from data broker sites and and they keep me updated with detailed reports so I know exactly what's been taken down. I'm genuinely relieved. Knowing my privacy isn't something I have to worry about every day. The Deleteme team handles everything. It's the set it and forget it peace of mind. And it's not just for individuals. DeleteMe also offers solutions for businesses, helping companies protect their employees personal information and reduce exposure to social engineering and phishing threats. And right now, our listeners get a special 20% off your delete me plan. Just go to JoinDeleteMe.com N2K and use promo code N2K at checkout. That's JoinDeleteMe.com N2k code N2K. NATO hosts the world's largest cyber defense exercise. The DOJ charges a dozen people in a racketeering conspiracy involving the theft of over $230 million in cryptocurrency. Japan has enacted a new active cyber defense law. Lawmakers pushed to reauthorize the Cybersecurity Information Sharing Act. Two critical Avanti endpoint Manager. Mobile vulnerabilities are under active exploitation. Hackers use a new fileless technique to deploy Remcosrat. The NSA's Director of Cybersecurity hangs up their hat. Our guest is Chris Cleary, VP of ManTech's global cyber practice, discussing the cyber battlespace of the future. And Coinbase flips the script on an extortion Attempt. It's Friday, May 16, 2025. I'm Dave Bittner and this is your Cyberwire Intel Briefing. Thanks for joining us here today. Happy Friday. It is great to have you with us. Earlier this week, the NATO Cooperative Cyber Defense center of Excellence hosted locked shields 2025, the world's largest cyber defense exercise in Tallinn, Estonia. Around 4,000 experts from 41 countries participated remotely simulating the defense of over 8,000 systems against thousands of cyber attacks. The event, which began in 2010 with just four nations, now features advanced challenges including AI driven narratives and quantum computing scenarios. Teams also tackled legal, strategic and disinformation challenges. While Germany, Singapore, Poland, France and Italy Slovenia, US teams scored highest. Organizers stressed scores don't reflect overall national readiness the exercise, planned by 450 experts and 25 industry partners, highlights growing global focus on cyber resilience. Looking ahead, 2026 will expand cloud infrastructure and introduce critical special systems to further bolster national defense capabilities. Twelve people have been charged by the DOJ in a racketeering conspiracy involving the theft of over $230 million in cryptocurrency. They allegedly used spoofed phone calls and social engineering to breach victim accounts, reset two FA and access private keys. A major theft involved 4,100 Bitcoin stolen from a victim in Washington, D.C. in August of last year. The group used crypto mixers, exchanges, VPNs and peel chains to launder funds into currencies like Monero. The money funded extravagant lifestyles, private jets, exotic cars, $500,000 nightclub tabs and other luxury goods. Two suspects were arrested earlier. The scheme involved roles ranging from hackers to money launderers. Despite laundering efforts, investigators linked the stolen funds back to the group with help from crypto sleuth Zach XBT and the FBI, Japan has enacted a new active cyber defense law, allowing preemptive cyber operations to disrupt threats before they cause harm. This marks a shift from Japan's traditionally defensive stance and aligns its cyber policy more closely with Western powers. The law authorizes law enforcement to neutralize hostile servers and grants the self defense forces authority over complex attacks. It also permits monitoring of foreign Internet traffic entering or transiting Japan. With oversight measures in place, the move follows a surge in state sponsored and financially driven cyberattacks in the U.S. lawmakers from both parties are pushing to reauthorize the Cybersecurity Information Sharing act, confusingly named CISA, before it expires on September 30. The law is seen as vital for enabling threat intelligence sharing between the government and private sector, bolstered by liability and privacy protections. Despite strong support from DHS Secretary Kristi Noem, reauthorization faces a tight deadline and unclear leadership support. Privacy concerns remain the biggest hurdle, though a recent DHS report found no violations under the law. Lawmakers are calling for a clean reauthorization with a possible update later. Subcommittee members also pushed to expand security clearance access to more technical professionals, arguing that current restrictions limit response effectiveness. The law has enabled the sharing of critical cyber threat data and is considered key to national Cyber Defense. Meanwhile, 17 Republican lawmakers, led by Senator Tom Cotton, urged the Trump administration to ban U.S. sales of TP Link routers, citing national security concerns. They allege the Chinese company has ties to the ccp, uses predatory pricing and poses a surveillance risk. TP Link denies these claims, calling them baseless and politically motivated. Lawmakers referenced Executive Order 13873 to justify the band, signed by President Donald Trump in May 2019. It grants the US Secretary of Commerce the authority to block transactions involving information and communications technology or services linked to foreign adversaries if they pose an unacceptable risk to national security. TP Link, which has a US Office in California, insists it isn't state sponsored and has not been contacted by US Regulators. Two critical vulnerabilities in Ivanti Endpoint Manager Mobile are under active exploitation, putting organizations at risk of unauthenticated remote code execution. The flaws affect all on premises versions up to 12.5 and stem from open source library issues, not Ivanti's core code. When chained, they let attackers bypass authentication and inject malicious Java code via improperly validated API input. The vulnerabilities allow attackers to install malware, access data, or disable device management. Ivanti and global cybersecurity agencies urge immediate patching to fixed versions if updating isn't possible. Temporary mitigations and close monitoring are essential. Unpatched systems are at high risk. As proof of concept, code circulates Publicly, hackers are using a new fileless technique to deploy Remcos RAT malware through a PowerShell based loader, bypassing Windows Defender. The attack begins with a malicious zip file containing a spoofed LNK shortcut. When opened, it triggers an obfuscated script that alters registry settings for persistence and injects multiple payloads, including REMCOS version 6 Pro. This updated version adds idle time tracking and infected host management. Researchers stress monitoring for LNK files, PowerShell misuse and registry changes to detect and prevent such threats. Dave Luber, the National Security Agency's director of cybersecurity, will retire at the end of this month after 38 years of distinguished service. Luber's career, which began as a high school work study participant, reflects deep commitment and steady leadership across decades of change. Rising through roles including executive director of U.S. cyber Command and and director of NSA Colorado, Luber brought a calm, collaborative approach to cybersecurity at a time of global digital unrest. Colleagues praise his efforts to improve intelligence sharing and strengthen public private partnerships amid escalating threats like China's Volt Typhoon campaign. Former NSA Deputy Director George Barnes called him competent, caring, communicative and an all around great leader, adding that Luber's presence will be sorely missed. His legacy, rooted in service and strategy, will continue shaping national cybersecurity for years to come. Coming up after the break, my conversation with Chris Cleary, VP of ManTech's Global Cyber Practice. We're discussing the cyber battle space of the future and Coinbase flips the script on an extortion attempt. Stay with us. And now a word from our sponsor, ThreatLocker. Keeping your system secure shouldn't mean constantly reacting to threats. ThreatLocker helps you take a different approach by giving you full control over what software can run in your environment. If it's not approved, it doesn't run. Simple as that. It's a way to stop ransomware and other attacks before they start without adding extra complexity to your day. See how ThreatLocker can help you lock down your environment at www.threatlocker.com foreign let's be real. Navigating security compliance can feel like assembling IKEA furniture without the instructions. You know you need it, but it takes forever and you're never quite sure if you've done it right. That's where Vanta comes in. Vanta is a trust management platform that automates up to 90% of the work for frameworks like SoC2, ISO 27001 and HIPAA, getting you audit ready in weeks, not months. Whether you're a founder, an engineer, or managing IT and security for the first time, Vanta helps you prove your security posture without taking over your Life. More than 10,000 companies, including names like Atlassian and Quora, trust Vanta to monitor compliance, streamline risk, and speed up security reviews by up to five times and the roi. A recent IDC report found Vanta saves businesses over half a million dollars a year and pays for itself in just three months. For a limited time, you can get $1,000 off vanta@vanta.com cyber that's v a n t a dot com Christopher Cleary is VP of ManTech's Global Cyber Practice. And in today's sponsored Industry Voices discussion we consider the cyber battlespace of the future. What are some of the biggest cyber threats that you see facing the US today?
